From 848f24a68c5bfa03b0e7697951db8a7dad0dea8b Mon Sep 17 00:00:00 2001 From: Juan Escobar Date: Mon, 27 Oct 2014 02:07:16 -0500 Subject: [PATCH] update module description --- modules/exploits/multi/http/x7chat2_php_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/multi/http/x7chat2_php_exec.rb b/modules/exploits/multi/http/x7chat2_php_exec.rb index ec72a932a5..a66de4974e 100644 --- a/modules/exploits/multi/http/x7chat2_php_exec.rb +++ b/modules/exploits/multi/http/x7chat2_php_exec.rb @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'The X7 Group X7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution', 'Description' => %q{ Library lib/message.php for X7 Chat 2.0.5 uses preg_replace() function with the /e modifier. - This allow execute PHP code in the remote machine. + This allows execute PHP code in the remote machine. }, 'License' => MSF_LICENSE, 'Author' =>